Which change management process component is concerned with the cost and resources necessary for implementation?
Multiple Choice Quizzes with Answer in English (Page: 250)
What is the reason to escalate a problem from a level one technician to a level two technician?
What is a typical task performed by a level one technician in a call center?
Which statement best describes a call center?
When performing computer forensics, what can be prevented with a properly and carefully documented chain of custody?
Why is a chain of custody important in a cybercrime case?
During computer forensics investigations, which type of data is lost when power is removed from the computer?
Which is true regarding the treatment of customer property?
What does a technician need in order to make changes to software installed on the computer of a customer?
Which two rules pertain to the general daily activities of employees in a call center environment? (Choose two.)
What should a level two technician do immediately after receiving an escalated work order from a level one technician?
A technician receives a call from a customer who is too talkative. How should the technician handle the call?
Which task would require that a problem be escalated to a level two technician?
A customer is angry and calls to complain that the service scheduled on the computer took longer than expected. The technician reviews the work order and notices that the service was performed by a new employee. How should the technician respond?
A support desk trainer is teaching a new support desk technician some basic rules about starting a conversation with a customer. Which statement describes the rules the trainer should be teaching?
A technician is troubleshooting a PC in a workplace environment and finds many pirated movies on the hard drive. What should the technician do?
What two actions should a call center technician avoid when dealing with an angry customer? (Choose two.)
Which statement is characteristic of most personal software licenses?
What is a characteristic of the open-source license of an application software?
What is the definition of cyber law?